Multiple vulnerabilities have been discovered in Google Chrome, which could allow for arbitrary code execution. Google Chrome is a web browser used to access the internet. Successful exploitation of these vulnerabilities could allow for arbitrary code execution in the context of the logged on user. Depending on the privileges associated with the user an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights.
More Stories
webkitgtk-2.48.1-2.fc40
FEDORA-2025-256a86d7c8 Packages in this update: webkitgtk-2.48.1-2.fc40 Update description: Limit the data stored in session state. Remove the empty area below...
webkitgtk-2.48.1-2.fc41
FEDORA-2025-059585d039 Packages in this update: webkitgtk-2.48.1-2.fc41 Update description: Limit the data stored in session state. Remove the empty area below...
webkitgtk-2.48.1-2.fc42
FEDORA-2025-5427adc3f4 Packages in this update: webkitgtk-2.48.1-2.fc42 Update description: Limit the data stored in session state. Remove the empty area below...
chromium-135.0.7049.52-2.el10_1
FEDORA-EPEL-2025-c6f4db8d49 Packages in this update: chromium-135.0.7049.52-2.el10_1 Update description: Update to 135.0.7049.52 High CVE-2025-3066: Use after free in Navigations Medium CVE-2025-3067:...
ZDI-CAN-26891: Amazon
A CVSS score 6.5 AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N severity vulnerability discovered by 'Jiri Gogela of Trend Research' was reported to the affected vendor...
USN-7415-1: Linux kernel vulnerabilities
Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This...